{"affected":[{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.194.1","kernel-azure-base":"4.12.14-16.194.1","kernel-azure-devel":"4.12.14-16.194.1","kernel-devel-azure":"4.12.14-16.194.1","kernel-source-azure":"4.12.14-16.194.1","kernel-syms-azure":"4.12.14-16.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.194.1","kernel-azure-base":"4.12.14-16.194.1","kernel-azure-devel":"4.12.14-16.194.1","kernel-devel-azure":"4.12.14-16.194.1","kernel-source-azure":"4.12.14-16.194.1","kernel-syms-azure":"4.12.14-16.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.194.1","kernel-azure-base":"4.12.14-16.194.1","kernel-azure-devel":"4.12.14-16.194.1","kernel-devel-azure":"4.12.14-16.194.1","kernel-source-azure":"4.12.14-16.194.1","kernel-syms-azure":"4.12.14-16.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.194.1","kernel-azure-base":"4.12.14-16.194.1","kernel-azure-devel":"4.12.14-16.194.1","kernel-devel-azure":"4.12.14-16.194.1","kernel-source-azure":"4.12.14-16.194.1","kernel-syms-azure":"4.12.14-16.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-azure","purl":"pkg:rpm/suse/kernel-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.194.1","kernel-azure-base":"4.12.14-16.194.1","kernel-azure-devel":"4.12.14-16.194.1","kernel-devel-azure":"4.12.14-16.194.1","kernel-source-azure":"4.12.14-16.194.1","kernel-syms-azure":"4.12.14-16.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-source-azure","purl":"pkg:rpm/suse/kernel-source-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.194.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"kernel-azure":"4.12.14-16.194.1","kernel-azure-base":"4.12.14-16.194.1","kernel-azure-devel":"4.12.14-16.194.1","kernel-devel-azure":"4.12.14-16.194.1","kernel-source-azure":"4.12.14-16.194.1","kernel-syms-azure":"4.12.14-16.194.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"kernel-syms-azure","purl":"pkg:rpm/suse/kernel-syms-azure&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12.14-16.194.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"The SUSE Linux Enterprise 12 SP5 Azure kernel was updated to receive various security bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).\n- CVE-2024-42096: x86: stop playing stack games in profile_pc() (bsc#1228633).\n- CVE-2024-39506: liquidio: adjust a NULL pointer handling path in lio_vf_rep_copy_packet (bsc#1227729).\n- CVE-2021-47619: i40e: Fix queues reservation for XDP (bsc#1226645).\n- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743).\n- CVE-2024-42124: scsi: qedf: Make qedf_execute_tmf() non-preemptible (bsc#1228705).\n- CVE-2024-42223: media: dvb-frontends: tda10048: Fix integer overflow (bsc#1228726).\n- CVE-2024-42119: drm/amd/display: Skip finding free audio for unknown engine_id (bsc#1228584).\n- CVE-2024-42120: drm/amd/display: Check pipe offset before setting vblank (bsc#1228588).\n- CVE-2024-41095: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_ld_modes (bsc#1228662).\n- CVE-2024-42224: net: dsa: mv88e6xxx: Correct check for empty list (bsc#1228723).\n- CVE-2024-41072: wifi: cfg80211: wext: add extra SIOCSIWSCAN data check (bsc#1228626).\n- CVE-2024-41048: skmsg: Skip zero length skb in sk_msg_recvmsg (bsc#1228565).\n- CVE-2024-40995: net/sched: act_api: fix possible infinite loop in tcf_idr_check_alloc() (bsc#1227830).\n- CVE-2024-41044: ppp: reject claimed-as-LCP but actually malformed packets (bsc#1228530).\n- CVE-2024-41066: ibmvnic: add tx check to prevent skb leak (bsc#1228640).\n- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).\n- CVE-2024-41089: drm/nouveau/dispnv04: fix null pointer dereference in nv17_tv_get_hd_modes (bsc#1228658).\n- CVE-2024-41060: drm/radeon: check bo_va->bo is non-NULL before using it (bsc#1228567).\n- CVE-2022-48829: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes (bsc#1228055).\n- CVE-2022-48828: NFSD: Fix ia_size underflow (bsc#1228054).\n- CVE-2022-48827: NFSD: Fix the behavior of READ near OFFSET_MAX (bsc#1228037).\n- CVE-2024-41078: btrfs: qgroup: fix quota root leak after quota disable failure (bsc#1228655).\n- CVE-2024-41071: wifi: mac80211: Avoid address calculations via out of bounds array indexing (bsc#1228625).\n- CVE-2024-41064: powerpc/eeh: avoid possible crash when edev->pdev changes (bsc#1228599).\n- CVE-2024-35949: btrfs: make sure that WRITTEN is set on all metadata blocks (bsc#1224700).\n- CVE-2024-41081: ila: block BH in ila_output() (bsc#1228617).\n- CVE-2024-40978: scsi: qedi: Fix crash while reading debugfs attribute (bsc#1227929).\n- CVE-2022-48792: scsi: pm8001: Fix use-after-free for aborted SSP/STP sas_task (bsc#1228013).\n- CVE-2022-48823: scsi: qedf: Fix refcount issue when LOGO is received during TMF (bsc#1228045).\n- CVE-2024-41076: NFSv4: Fix memory leak in nfs4_set_security_label (bsc#1228649).\n- CVE-2024-40998: ext4: fix uninitialized ratelimit_state->lock access in __ext4_fill_super() (bsc#1227866).\n- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).\n- CVE-2024-40987: drm/amdgpu: fix UBSAN warning in kv_dpm.c (bsc#1228235).\n- CVE-2022-48826: drm/vc4: Fix deadlock on DSI device attach error (bsc#1227975)\n- CVE-2024-27437: vfio/pci: Disable auto-enable of exclusive INTx IRQ (bsc#1222625).\n- CVE-2024-41015: ocfs2: add bounds checking to ocfs2_check_dir_entry() (bsc#1228409).\n- CVE-2024-41016: ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).\n- CVE-2024-41063: bluetooth: hci_core: cancel all works upon hci_unregister_dev() (bsc#1228580).\n- CVE-2024-42070: netfilter: nf_tables: fully validate NFT_DATA_VALUE on store to data registers (bsc#1228470).\n- CVE-2024-41070: KVM: PPC: Book3S HV: Prevent UAF in kvm_spapr_tce_attach_iommu_group() (bsc#1228581).\n- CVE-2021-47405: HID: usbhid: free raw_report buffers in usbhid_stop (bsc#1225238).\n- CVE-2024-40988: drm/radeon: fix UBSAN warning in kv_dpm.c (bsc#1227957).\n- CVE-2024-40932: drm/exynos/vidi: fix memory leak in .get_modes() (bsc#1227828).\n- CVE-2021-47403: ipack: ipoctal: fix module reference leak (bsc#1225241).\n- CVE-2021-47388: mac80211: fix use-after-free in CCMP/GCMP RX (bsc#1225214).\n- CVE-2024-41014: xfs: add bounds checking to xlog_recover_process_data (bsc#1228408).\n- CVE-2024-41091: tun: add missing verification for short frame (bsc#1228327).\n- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).\n- CVE-2024-40999: net: ena: Add validation for completion descriptors consistency (bsc#1227913).\n- CVE-2024-35837: net: mvpp2: clear BM pool before initialization (bsc#1224500).\n- CVE-2021-47588: sit: do not call ipip6_dev_free() from sit_init_net() (bsc#1226568).\n- CVE-2022-48804: vt_ioctl: fix array_index_nospec in vt_setactivate (bsc#1227968).\n- CVE-2024-40967: serial: imx: Introduce timeout when waiting on transmitter empty (bsc#1227891).\n- CVE-2024-40966: kABI: tty: add the option to have a tty reject a new ldisc (bsc#1227886).\n- CVE-2022-48850: net-sysfs: add check for netdevice being present to speed_show (bsc#1228071).\n- CVE-2021-47582: usb: core: Do not hold the device lock while sleeping in do_proc_control() (bsc#1226559).\n- CVE-2024-40982: ssb: fix potential NULL pointer dereference in ssb_device_uevent() (bsc#1227865).\n- CVE-2021-47468: isdn: mISDN: Fix sleeping function called from invalid context (bsc#1225346).\n- CVE-2021-47395: mac80211: limit injected vht mcs/nss in ieee80211_parse_tx_radiotap (bsc#1225326).\n- CVE-2022-48810: ipmr,ip6mr: acquire RTNL before calling ip[6]mr_free_table() on failure path (bsc#1227936).\n- CVE-2023-52594: Fixed potential array-index-out-of-bounds read in ath9k_htc_txstatus() (bsc#1221045).\n- CVE-2022-48855: sctp: fix kernel-infoleak for SCTP sockets (bsc#1228003).\n- CVE-2021-47580: scsi: scsi_debug: Fix type in min_t to avoid stack OOB (bsc#1226550).\n- CVE-2024-26735: ipv6: sr: fix possible use-after-free and null-ptr-deref (bsc#1222372).\n- CVE-2024-38560: scsi: bfa: Ensure the copied buf is NUL terminated (bsc#1226786).\n- CVE-2022-48811: ibmvnic: do not release napi in __ibmvnic_open() (bsc#1227928).\n- CVE-2021-0129: Improper access control in BlueZ may have allowed an authenticated user to potentially enable information disclosure via adjacent access (bsc#1186463).\n- CVE-2020-26558: Fixed a flaw in the Bluetooth LE and BR/EDR secure pairing that could permit a nearby man-in-the-middle attacker to identify the Passkey used during pairing (bsc#1179610).\n- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).\n- CVE-2024-39507: net: hns3: fix kernel crash problem in concurrent scenario (bsc#1227730).\n- CVE-2024-40923: vmxnet3: disable rx data ring on dma allocation failure (bsc#1227786).\n- CVE-2024-40941: wifi: iwlwifi: mvm: do not read past the mfuart notifcation (bsc#1227771).\n- CVE-2022-48860: ethernet: Fix error handling in xemaclite_of_probe (bsc#1228008).\n- CVE-2022-48863: mISDN: Fix memory leak in dsp_pipeline_build() (bsc#1228063).\n- CVE-2024-40953: KVM: Fix a data race on last_boosted_vcpu in kvm_vcpu_on_spin() (bsc#1227806).\n- CVE-2024-39499: vmci: prevent speculation leaks by sanitizing event in event_deliver() (bsc#1227725).\n- CVE-2024-39487: bonding: Fix out-of-bounds read in bond_option_arp_ip_targets_set() (bsc#1227573)\n- CVE-2024-35934: net/smc: reduce rtnl pressure in smc_pnet_create_pnetids_list() (bsc#1224641)\n- CVE-2024-40959: xfrm6: check ip6_dst_idev() return value in xfrm6_get_saddr() (bsc#1227884).\n- CVE-2024-35893: net/sched: act_skbmod: prevent kernel-infoleak (bsc#1224512)\n- CVE-2021-47441: mlxsw: thermal: Fix out-of-bounds memory accesses (bsc#1225224)\n- CVE-2021-47194: cfg80211: call cfg80211_stop_ap when switch from P2P_GO type (bsc#1222829).\n- CVE-2024-27020: netfilter: nf_tables: Fix potential data-race in __nft_expr_type_get() (bsc#1223815)\n- CVE-2022-48775: Drivers: hv: vmbus: Fix memory leak in vmbus_add_channel_kobj (bsc#1227924).\n- CVE-2024-27019: netfilter: nf_tables: Fix potential data-race in __nft_obj_type_get() (bsc#1223813)\n- CVE-2024-40929: wifi: iwlwifi: mvm: check n_ssids before accessing the ssids (bsc#1227774).\n- CVE-2024-40912: wifi: mac80211: Fix deadlock in ieee80211_sta_ps_deliver_wakeup() (bsc#1227790).\n- CVE-2024-40942: wifi: mac80211: mesh: Fix leak of mesh_preq_queue objects (bsc#1227770).\n- CVE-2022-48857: NFC: port100: fix use-after-free in port100_send_complete (bsc#1228005).\n- CVE-2024-36902: ipv6: fib6_rules: avoid possible NULL dereference in fib6_rule_action() (bsc#1225719).\n- CVE-2021-47606: net: netlink: af_netlink: Prevent empty skb by adding a check on len. (bsc#1226555).\n- CVE-2024-40901: scsi: mpt3sas: Avoid test/set_bit() operating in non-allocated memory (bsc#1227762).\n- CVE-2024-26924: scsi: lpfc: Release hbalock before calling lpfc_worker_wake_up() (bsc#1225820).\n- CVE-2024-26830: Fixed i40e to not allow untrusted VF to remove administratively set MAC (bsc#1223012).\n- CVE-2021-47516: nfp: Fix memory leak in nfp_cpp_area_cache_add() (bsc#1225427).\n- CVE-2021-47501: i40e: Fix NULL pointer dereference in i40e_dbg_dump_desc (bsc#1225361).\n- CVE-2024-39501: drivers: core: synchronize really_probe() and dev_uevent() (bsc#1227754).\n- CVE-2023-52743: ice: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1225003)\n- CVE-2021-47542: net: qlogic: qlcnic: Fix a NULL pointer dereference in qlcnic_83xx_add_rings() (bsc#1225455).\n- CVE-2024-36901: ipv6: prevent NULL dereference in ip6_output() (bsc#1225711)\n- CVE-2024-36004: i40e: Do not use WQ_MEM_RECLAIM flag for workqueue (bsc#1224545)\n- CVE-2024-27025: nbd: null check for nla_nest_start (bsc#1223778)\n- CVE-2021-47599: btrfs: use latest_dev in btrfs_show_devname (bsc#1226571).\n- CVE-2023-52435: net: prevent mss overflow in skb_segment() (bsc#1220138).\n- CVE-2024-26663: tipc: Check the bearer type before calling tipc_udp_nl_bearer_add() (bsc#1222326).\n- CVE-2021-47597: inet_diag: fix kernel-infoleak for UDP sockets (bsc#1226553).\n- CVE-2024-39490: ipv6: sr: fix missing sk_buff release in seg6_input_core (bsc#1227626).\n- CVE-2024-38558: net: openvswitch: fix overwriting ct original tuple for ICMPv6 (bsc#1226783).\n- CVE-2024-26615: net/smc: fix illegal rmb_desc access in SMC-D connection dump (bsc#1220942).\n- CVE-2023-52619: Fixed possible crash when setting number of cpus to an odd number in pstore/ram (bsc#1221618).\n- CVE-2024-26659: Fixed wrong handling of isoc Babble and Buffer Overrun events in xhci (bsc#1222317).\n- CVE-2024-35978: Bluetooth: Fix memory leak in hci_req_sync_complete() (bsc#1224571).\n- CVE-2023-52669: crypto: s390/aes - Fix buffer overread in CTR mode (bsc#1224637).\n- CVE-2023-52615: Fixed page fault dead lock on mmap-ed hwrng (bsc#1221614).\n- CVE-2023-52612: Fixed req->dst buffer overflow in crypto/scomp (bsc#1221616).\n- CVE-2024-35995: ACPI: CPPC: Use access_width over bit_width for system memory accesses (bsc#1224557).\n- CVE-2023-52623: Fixed suspicious RCU usage in SUNRPC (bsc#1222060).\n- CVE-2021-47295: net: sched: fix memory leak in tcindex_partial_destroy_work (bsc#1224975)\n- CVE-2023-52693: ACPI: video: check for error while searching for backlight device parent (bsc#1224686).\n- CVE-2023-52683: ACPI: LPIT: Avoid u32 multiplication overflow (bsc#1224627).\n- CVE-2023-4244: Fixed a use-after-free in the nf_tables component, which could be exploited to achieve local privilege escalation (bsc#1215420).\n- CVE-2024-39475: fbdev: savage: Handle err return when savagefb_check_var failed (bsc#1227435)\n- CVE-2021-47520: can: pch_can: pch_can_rx_normal: fix use after free (bsc#1225431).\n- CVE-2024-36941: wifi: nl80211: do not free NULL coalescing rule (bsc#1225835).\n- CVE-2021-47145: btrfs: do not BUG_ON in link_to_fixup_dir (bsc#1222005).\n- CVE-2021-47547: net: tulip: de4x5: fix the problem that the array 'lp->phy' may be out of bound (bsc#1225505).\n- CVE-2023-52817: drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL (bsc#1225569).\n- CVE-2023-52819: drm/amd: Fix UBSAN array-index-out-of-bounds for Polaris and Tonga (bsc#1225532).\n- CVE-2023-52818: drm/amd: Fix UBSAN array-index-out-of-bounds for SMU7 (bsc#1225530).\n- CVE-2023-52753: drm/amd/display: Avoid NULL dereference of timing generator (bsc#1225478).\n- CVE-2024-36014: drm/arm/malidp: fix a possible null pointer dereference (bsc#1225593).\n- CVE-2024-26636: llc: make llc_ui_sendmsg() more robust against bonding changes (bsc#1221659).\n- CVE-2024-26635: llc: Drop support for ETH_P_TR_802_2 (bsc#1221656).\n- CVE-2024-35828: wifi: libertas: fix some memleaks in lbs_allocate_cmd_buffer() (bsc#1224622).\n- CVE-2023-52507: Fixed possible shift-out-of-bounds in nfc/nci (bsc#1220833).\n- CVE-2024-38598: md: fix resync softlockup when bitmap size is less than array size (bsc#1226757).\n- CVE-2024-35805: dm snapshot: fix lockup in dm_exception_table_exit (bsc#1224743).\n- CVE-2024-26880: dm: call the resume method on internal suspend (bsc#1223188).\n- CVE-2021-47498: dm rq: do not queue request to blk-mq during DM suspend (bsc#1225357).\n- CVE-2021-47275: bcache: avoid oversized read request in cache missing code path (bsc#1224965).\n- CVE-2024-38619: usb-storage: alauda: Check whether the media is initialized (bsc#1226861).\n- CVE-2021-47201: iavf: free q_vectors before queues in iavf_disable_vf (bsc#1222792).\n- CVE-2024-26863: hsr: Fix uninit-value access in hsr_get_node() (bsc#1223021).\n- CVE-2024-38630: watchdog: cpu5wdt.c: Fix use-after-free bug caused by cpu5wdt_trigger (bsc#1226908).\n- CVE-2024-39301: net/9p: fix uninit-value in p9_client_rpc() (bsc#1226994).\n- CVE-2021-47559: net/smc: Fix NULL pointer dereferencing in smc_vlan_by_tcpsk() (bsc#1225396).\n\nThe following non-security bugs were fixed:\n\n- Fix spurious WARNING caused by a qxl driver patch (bsc#1227213,bsc#1227191)\n- KVM: PPC: Book3S HV: Do not take kvm->lock around kvm_for_each_vcpu (bsc#1065729).\n- KVM: PPC: Book3S HV: remove extraneous asterisk from rm_host_ipi_action() comment (bsc#1065729).\n- KVM: PPC: Book3S PR: Exiting split hack mode needs to fixup both PC and LR (bsc#1065729).\n- KVM: PPC: Book3S: Fix some RCU-list locks (git-fixes).\n- KVM: PPC: Book3S: Only report KVM_CAP_SPAPR_TCE_VFIO on powernv machines (bsc#1065729).\n- KVM: PPC: Book3S: Use new mutex to synchronize access to rtas token list (bsc#1065729).\n- KVM: PPC: Inform the userspace about TCE update failures (bsc#1065729).\n- KVM: PPC: Move and undef TRACE_INCLUDE_PATH/FILE (bsc#1065729).\n- PCI: Fix resource double counting on remove & rescan (git-fixes).\n- PCI: hv: Return zero, not garbage, when reading PCI_INTERRUPT_PIN (git-fixes).\n- PM: hibernate: x86: Use crc32 instead of md5 for hibernation e820 integrity check (git-fixes).\n- SUNRPC: Fix gss_free_in_token_pages() (git-fixes).\n- SUNRPC: Fix loop termination condition in gss_free_in_token_pages() (git-fixes).\n- Tools: hv: kvp: eliminate 'may be used uninitialized' warning (git-fixes).\n- USB: class: cdc-wdm: Fix CPU lockup caused by excessive log messages (git-fixes).\n- btrfs: fix 64bit compat send ioctl arguments not initializing version member (bsc#1228030).\n- btrfs: fix send ioctl on 32bit with 64bit kernel (bsc#1228030).\n- btrfs: incremental send, fix emission of invalid clone operations (bsc#1228030).\n- btrfs: remove unused members dir_path from recorded_ref (bsc#1228030).\n- btrfs: send, improve clone range (bsc#1228030).\n- btrfs: send: add new command FILEATTR for file attributes (bsc#1228030).\n- btrfs: send: add stream v2 definitions (bsc#1228030).\n- btrfs: send: always use the rbtree based inode ref management infrastructure (bsc#1228030).\n- btrfs: send: avoid copying file data (bsc#1228030).\n- btrfs: send: explicitly number commands and attributes (bsc#1228030).\n- btrfs: send: fix failures when processing inodes with no links (bsc#1228030).\n- btrfs: send: fix send failure of a subcase of orphan inodes (bsc#1228030).\n- btrfs: send: fix sending link commands for existing file paths (bsc#1228030).\n- btrfs: send: get rid of i_size logic in send_write() (bsc#1228030).\n- btrfs: send: introduce recorded_ref_alloc and recorded_ref_free (bsc#1228030).\n- btrfs: send: prepare for v2 protocol (bsc#1228030).\n- btrfs: send: refactor arguments of get_inode_info() (bsc#1228030).\n- btrfs: send: remove stale code when checking for shared extents (bsc#1228030).\n- btrfs: send: remove unused found_type parameter to lookup_dir_item_inode() (bsc#1228030).\n- btrfs: send: remove unused send_ctx::{total,cmd}_send_size (bsc#1228030).\n- btrfs: send: use boolean types for current inode status (bsc#1228030).\n- btrfs: silence maybe-uninitialized warning in clone_range (bsc#1228030).\n- drm/amdgpu/debugfs: fix error code when smc register accessors are NULL (git-fixes).\n- drm/vc4: dsi: Only register our component once a DSI device is (bsc#1227975)\n- hv_netvsc: rndis_filter needs to select NLS (git-fixes).\n- ipv6: sr: fix incorrect unregister order (git-fixes).\n- kgdb: Add kgdb_has_hit_break function (git-fixes).\n- kgdb: Move the extern declaration kgdb_has_hit_break() to generic kgdb.h (git-fixes).\n- net: hsr: fix placement of logical operator in a multi-line statement (bsc#1223021).\n- net: mana: Fix the extra HZ in mana_hwc_send_request (git-fixes).\n- net: mana: select PAGE_POOL (git-fixes).\n- net_sched: add a temporary refcnt for struct tcindex_data (bsc#1224975).\n- net_sched: fix a memory leak in cls_tcindex (bsc#1224975).\n- net_sched: fix a missing refcnt in tcindex_init() (bsc#1224975).\n- net_sched: hold rtnl lock in tcindex_partial_destroy_work() (bsc#1224975)\n- nfs: Handle error of rpc_proc_register() in nfs_net_init() (git-fixes).\n- nvme: fixup comment for nvme RDMA Provider Type (git-fixes).\n- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).\n- ocfs2: remove redundant assignment to variable free_space (bsc#1228409).\n- ocfs2: strict bound check before memcmp in ocfs2_xattr_find_entry() (bsc#1228410).\n- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).\n- sched/deadline: Fix BUG_ON condition for deboosted tasks (bsc#1227407).\n- scsi: qla2xxx: Avoid possible run-time warning with long model_num (bsc#1228850).\n- scsi: qla2xxx: Complete command early within lock (bsc#1228850).\n- scsi: qla2xxx: Convert comma to semicolon (bsc#1228850).\n- scsi: qla2xxx: Drop driver owner assignment (bsc#1228850).\n- scsi: qla2xxx: During vport delete send async logout explicitly (bsc#1228850).\n- scsi: qla2xxx: Fix debugfs output for fw_resource_count (bsc#1228850).\n- scsi: qla2xxx: Fix flash read failure (bsc#1228850).\n- scsi: qla2xxx: Fix for possible memory corruption (bsc#1228850).\n- scsi: qla2xxx: Fix optrom version displayed in FDMI (bsc#1228850).\n- scsi: qla2xxx: Reduce fabric scan duplicate code (bsc#1228850).\n- scsi: qla2xxx: Remove unused struct 'scsi_dif_tuple' (bsc#1228850).\n- scsi: qla2xxx: Return ENOBUFS if sg_cnt is more than one for ELS cmds (bsc#1228850).\n- scsi: qla2xxx: Unable to act on RSCN for port online (bsc#1228850).\n- scsi: qla2xxx: Update version to 10.02.09.300-k (bsc#1228850).\n- scsi: qla2xxx: Use QP lock to search for bsg (bsc#1228850).\n- scsi: qla2xxx: validate nvme_local_port correctly (bsc#1228850).\n- signal: Introduce clear_siginfo (git-fixes).\n- string.h: Introduce memtostr() and memtostr_pad() (bsc#1228850).\n- sunrpc: fix NFSACL RPC retry on soft mount (git-fixes).\n- tools lib: Fix builds when glibc contains strlcpy() (git-fixes).\n- tools: hv: fix KVP and VSS daemons exit code (git-fixes).\n- usb: add a hcd_uses_dma helper (git-fixes).\n- usb: atm: cxacru: fix endpoint checking in cxacru_bind() (git-fixes).\n- usb: musb: da8xx: fix a resource leak in probe() (git-fixes).\n- x86/apic: Fix kernel panic when booting with intremap=off and x2apic_phys (git-fixes).\n- x86/bhi: Avoid warning in #DB handler due to BHI mitigation (git-fixes).\n- x86/boot/e820: Fix typo in e820.c comment (git-fixes).\n- x86/bugs: Remove CONFIG_BHI_MITIGATION_AUTO and spectre_bhi=auto (git-fixes).\n- x86/bugs: Replace CONFIG_SPECTRE_BHI_{ON,OFF} with CONFIG_MITIGATION_SPECTRE_BHI (git-fixes).\n- x86/cpu: Fix AMD erratum #1485 on Zen4-based CPUs (git-fixes).\n- x86/fpu: Return proper error codes from user access functions (git-fixes).\n- x86/ioremap: Fix page aligned size calculation in __ioremap_caller() (git-fixes).\n- x86/kprobes: Fix kprobes instruction boudary check with CONFIG_RETHUNK (git-fixes).\n- x86/kprobes: Fix optprobe optimization check with CONFIG_RETHUNK (git-fixes).\n- x86/msr: Fix wr/rdmsr_safe_regs_on_cpu() prototypes (git-fixes).\n- x86/numa: Use cpumask_available instead of hardcoded NULL check (git-fixes).\n- x86: __memcpy_flushcache: fix wrong alignment if size > 2^32 (git-fixes).\n- xfs: check that dir block entries do not off the end of the buffer (git-fixes).\n- xfs: refactor xfs_verifier_error and xfs_buf_ioerror (git-fixes).\n- xfs: remove XFS_WANT_CORRUPTED_RETURN from dir3 data verifiers (git-fixes).\n- xhci: Poll for U0 after disabling USB2 LPM (git-fixes).\n","id":"SUSE-SU-2024:2901-1","modified":"2024-08-14T07:24:46Z","published":"2024-08-14T07:24:46Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20242901-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1065729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1088701"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149446"},{"type":"REPORT","url":"https://bugzilla.suse.com/1179610"},{"type":"REPORT","url":"https://bugzilla.suse.com/1186463"},{"type":"REPORT","url":"https://bugzilla.suse.com/1196018"},{"type":"REPORT","url":"https://bugzilla.suse.com/1202346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1215420"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220138"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220833"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220942"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221614"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221616"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221618"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221656"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221659"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222060"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222317"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222372"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222625"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222776"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222792"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222829"},{"type":"REPORT","url":"https://bugzilla.suse.com/1222866"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223012"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223021"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223188"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223778"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223813"},{"type":"REPORT","url":"https://bugzilla.suse.com/1223815"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224500"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224512"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224545"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224557"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224576"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224587"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224622"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224627"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224637"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224641"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224647"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224663"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224683"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224686"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224699"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224700"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224965"},{"type":"REPORT","url":"https://bugzilla.suse.com/1224975"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225214"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225224"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225229"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225238"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225241"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225326"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225328"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225346"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225357"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225361"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225396"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225427"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225431"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225455"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225478"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225505"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225530"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225532"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225569"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225711"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225719"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225767"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225820"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225835"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225838"},{"type":"REPORT","url":"https://bugzilla.suse.com/1225898"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226550"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226555"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226559"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226568"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226571"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226645"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226757"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226783"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226834"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226861"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226908"},{"type":"REPORT","url":"https://bugzilla.suse.com/1226994"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227191"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227213"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227407"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227435"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227487"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227573"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227618"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227716"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227725"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227729"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227730"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227733"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227750"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227754"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227762"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227770"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227771"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227772"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227774"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227786"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227790"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227806"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227824"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227828"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227830"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227836"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227849"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227865"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227866"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227884"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227886"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227891"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227913"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227924"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227928"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227929"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227936"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227957"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227968"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227969"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227975"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227985"},{"type":"REPORT","url":"https://bugzilla.suse.com/1227989"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228003"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228005"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228008"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228013"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228025"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228030"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228037"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228045"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228054"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228055"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228063"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228071"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228235"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228237"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228327"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228328"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228408"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228409"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228410"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228470"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228530"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228561"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228565"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228567"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228580"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228581"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228584"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228588"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228599"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228617"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228625"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228626"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228633"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228640"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228649"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228655"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228658"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228662"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228680"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228705"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228723"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228726"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228743"},{"type":"REPORT","url":"https://bugzilla.suse.com/1228850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2020-26558"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-0129"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47191"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47194"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47197"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47201"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47219"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47275"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47295"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47395"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47405"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47438"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47441"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47468"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47498"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47501"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47516"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47520"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47542"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47547"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47559"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47580"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47582"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47588"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47597"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47599"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47606"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2021-47619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-20368"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-28748"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-2964"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48794"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48804"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48810"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48811"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48823"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48826"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48827"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48829"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48850"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48855"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48857"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48860"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-48863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-4244"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52435"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52594"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52612"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52623"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52669"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52683"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52693"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52753"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52817"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-52885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26615"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26635"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26636"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26659"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26663"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26735"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26863"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26920"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-26924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27019"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27020"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27025"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-27437"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35805"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35806"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35893"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35934"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35947"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35949"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-35995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36004"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36288"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36592"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36902"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36919"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36924"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36939"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-36952"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38558"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38560"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38619"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-38630"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39301"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39475"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39487"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39488"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39490"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39494"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39499"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39501"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39506"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39507"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-39509"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40901"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40904"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40912"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40923"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40929"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40932"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40937"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40941"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40942"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40943"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40953"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40959"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40966"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40967"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40978"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40982"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40987"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40988"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40995"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40998"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-40999"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41014"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41015"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41016"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41044"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41059"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41060"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41063"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41064"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41066"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41071"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41072"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41076"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41078"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41081"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41089"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41090"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41091"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-41095"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42070"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42093"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42096"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42120"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42124"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42145"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42223"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-42224"}],"related":["CVE-2020-26558","CVE-2021-0129","CVE-2021-47145","CVE-2021-47191","CVE-2021-47194","CVE-2021-47197","CVE-2021-47201","CVE-2021-47219","CVE-2021-47275","CVE-2021-47295","CVE-2021-47388","CVE-2021-47395","CVE-2021-47399","CVE-2021-47403","CVE-2021-47405","CVE-2021-47438","CVE-2021-47441","CVE-2021-47468","CVE-2021-47498","CVE-2021-47501","CVE-2021-47516","CVE-2021-47520","CVE-2021-47542","CVE-2021-47547","CVE-2021-47559","CVE-2021-47580","CVE-2021-47582","CVE-2021-47588","CVE-2021-47597","CVE-2021-47599","CVE-2021-47606","CVE-2021-47619","CVE-2022-20368","CVE-2022-28748","CVE-2022-2964","CVE-2022-48775","CVE-2022-48792","CVE-2022-48794","CVE-2022-48804","CVE-2022-48805","CVE-2022-48810","CVE-2022-48811","CVE-2022-48823","CVE-2022-48826","CVE-2022-48827","CVE-2022-48828","CVE-2022-48829","CVE-2022-48836","CVE-2022-48839","CVE-2022-48850","CVE-2022-48855","CVE-2022-48857","CVE-2022-48860","CVE-2022-48863","CVE-2023-4244","CVE-2023-52435","CVE-2023-52507","CVE-2023-52594","CVE-2023-52612","CVE-2023-52615","CVE-2023-52619","CVE-2023-52623","CVE-2023-52669","CVE-2023-52683","CVE-2023-52693","CVE-2023-52743","CVE-2023-52753","CVE-2023-52817","CVE-2023-52818","CVE-2023-52819","CVE-2023-52885","CVE-2024-26615","CVE-2024-26635","CVE-2024-26636","CVE-2024-26659","CVE-2024-26663","CVE-2024-26735","CVE-2024-26830","CVE-2024-26863","CVE-2024-26880","CVE-2024-26920","CVE-2024-26924","CVE-2024-27019","CVE-2024-27020","CVE-2024-27025","CVE-2024-27437","CVE-2024-35805","CVE-2024-35806","CVE-2024-35819","CVE-2024-35828","CVE-2024-35837","CVE-2024-35887","CVE-2024-35893","CVE-2024-35934","CVE-2024-35947","CVE-2024-35949","CVE-2024-35966","CVE-2024-35967","CVE-2024-35978","CVE-2024-35995","CVE-2024-36004","CVE-2024-36014","CVE-2024-36288","CVE-2024-36592","CVE-2024-36901","CVE-2024-36902","CVE-2024-36919","CVE-2024-36924","CVE-2024-36939","CVE-2024-36941","CVE-2024-36952","CVE-2024-38558","CVE-2024-38560","CVE-2024-38598","CVE-2024-38619","CVE-2024-38630","CVE-2024-39301","CVE-2024-39475","CVE-2024-39487","CVE-2024-39488","CVE-2024-39490","CVE-2024-39494","CVE-2024-39499","CVE-2024-39501","CVE-2024-39506","CVE-2024-39507","CVE-2024-39509","CVE-2024-40901","CVE-2024-40904","CVE-2024-40912","CVE-2024-40923","CVE-2024-40929","CVE-2024-40932","CVE-2024-40937","CVE-2024-40941","CVE-2024-40942","CVE-2024-40943","CVE-2024-40953","CVE-2024-40959","CVE-2024-40966","CVE-2024-40967","CVE-2024-40978","CVE-2024-40982","CVE-2024-40987","CVE-2024-40988","CVE-2024-40990","CVE-2024-40995","CVE-2024-40998","CVE-2024-40999","CVE-2024-41014","CVE-2024-41015","CVE-2024-41016","CVE-2024-41044","CVE-2024-41048","CVE-2024-41059","CVE-2024-41060","CVE-2024-41063","CVE-2024-41064","CVE-2024-41066","CVE-2024-41070","CVE-2024-41071","CVE-2024-41072","CVE-2024-41076","CVE-2024-41078","CVE-2024-41081","CVE-2024-41089","CVE-2024-41090","CVE-2024-41091","CVE-2024-41095","CVE-2024-42070","CVE-2024-42093","CVE-2024-42096","CVE-2024-42119","CVE-2024-42120","CVE-2024-42124","CVE-2024-42145","CVE-2024-42223","CVE-2024-42224"],"summary":"Security update for the Linux Kernel","upstream":["CVE-2020-26558","CVE-2021-0129","CVE-2021-47145","CVE-2021-47191","CVE-2021-47194","CVE-2021-47197","CVE-2021-47201","CVE-2021-47219","CVE-2021-47275","CVE-2021-47295","CVE-2021-47388","CVE-2021-47395","CVE-2021-47399","CVE-2021-47403","CVE-2021-47405","CVE-2021-47438","CVE-2021-47441","CVE-2021-47468","CVE-2021-47498","CVE-2021-47501","CVE-2021-47516","CVE-2021-47520","CVE-2021-47542","CVE-2021-47547","CVE-2021-47559","CVE-2021-47580","CVE-2021-47582","CVE-2021-47588","CVE-2021-47597","CVE-2021-47599","CVE-2021-47606","CVE-2021-47619","CVE-2022-20368","CVE-2022-28748","CVE-2022-2964","CVE-2022-48775","CVE-2022-48792","CVE-2022-48794","CVE-2022-48804","CVE-2022-48805","CVE-2022-48810","CVE-2022-48811","CVE-2022-48823","CVE-2022-48826","CVE-2022-48827","CVE-2022-48828","CVE-2022-48829","CVE-2022-48836","CVE-2022-48839","CVE-2022-48850","CVE-2022-48855","CVE-2022-48857","CVE-2022-48860","CVE-2022-48863","CVE-2023-4244","CVE-2023-52435","CVE-2023-52507","CVE-2023-52594","CVE-2023-52612","CVE-2023-52615","CVE-2023-52619","CVE-2023-52623","CVE-2023-52669","CVE-2023-52683","CVE-2023-52693","CVE-2023-52743","CVE-2023-52753","CVE-2023-52817","CVE-2023-52818","CVE-2023-52819","CVE-2023-52885","CVE-2024-26615","CVE-2024-26635","CVE-2024-26636","CVE-2024-26659","CVE-2024-26663","CVE-2024-26735","CVE-2024-26830","CVE-2024-26863","CVE-2024-26880","CVE-2024-26920","CVE-2024-26924","CVE-2024-27019","CVE-2024-27020","CVE-2024-27025","CVE-2024-27437","CVE-2024-35805","CVE-2024-35806","CVE-2024-35819","CVE-2024-35828","CVE-2024-35837","CVE-2024-35887","CVE-2024-35893","CVE-2024-35934","CVE-2024-35947","CVE-2024-35949","CVE-2024-35966","CVE-2024-35967","CVE-2024-35978","CVE-2024-35995","CVE-2024-36004","CVE-2024-36014","CVE-2024-36288","CVE-2024-36592","CVE-2024-36901","CVE-2024-36902","CVE-2024-36919","CVE-2024-36924","CVE-2024-36939","CVE-2024-36941","CVE-2024-36952","CVE-2024-38558","CVE-2024-38560","CVE-2024-38598","CVE-2024-38619","CVE-2024-38630","CVE-2024-39301","CVE-2024-39475","CVE-2024-39487","CVE-2024-39488","CVE-2024-39490","CVE-2024-39494","CVE-2024-39499","CVE-2024-39501","CVE-2024-39506","CVE-2024-39507","CVE-2024-39509","CVE-2024-40901","CVE-2024-40904","CVE-2024-40912","CVE-2024-40923","CVE-2024-40929","CVE-2024-40932","CVE-2024-40937","CVE-2024-40941","CVE-2024-40942","CVE-2024-40943","CVE-2024-40953","CVE-2024-40959","CVE-2024-40966","CVE-2024-40967","CVE-2024-40978","CVE-2024-40982","CVE-2024-40987","CVE-2024-40988","CVE-2024-40990","CVE-2024-40995","CVE-2024-40998","CVE-2024-40999","CVE-2024-41014","CVE-2024-41015","CVE-2024-41016","CVE-2024-41044","CVE-2024-41048","CVE-2024-41059","CVE-2024-41060","CVE-2024-41063","CVE-2024-41064","CVE-2024-41066","CVE-2024-41070","CVE-2024-41071","CVE-2024-41072","CVE-2024-41076","CVE-2024-41078","CVE-2024-41081","CVE-2024-41089","CVE-2024-41090","CVE-2024-41091","CVE-2024-41095","CVE-2024-42070","CVE-2024-42093","CVE-2024-42096","CVE-2024-42119","CVE-2024-42120","CVE-2024-42124","CVE-2024-42145","CVE-2024-42223","CVE-2024-42224"]}